CASE BASED REASONING A SHORT OVERVIEW

Size: px
Start display at page:

Download "CASE BASED REASONING A SHORT OVERVIEW"

Transcription

1 CASE BASED REASONING A SHORT OVERVIEW Z. Budimac, V. Kurbalija Institute of Mathematics and Computer Science, Fac. of Science, Univ. of Novi Sad Trg D. Obradovića 4, Novi Sad, Yugoslavia zjb@im.ns.ac.yu, kurba@im.ns.ac.yu Abstract: Case based reasoning is a relatively new approach in intelligent search of (large) databases. Every new search is based on previous (similar) cases, thus including an experience in the search-engine. This approach gained much attention in e-business applications and search over the Internet. The paper presents basics of case based reasoning systems, while the talk concentrates on realistic examples. Keywords: artificial intelligence, case-based reasoning systems 1. Introduction Generally speaking, case-based reasoning is applied for solving new problems by adapting solutions that worked for similar problems in the past. In this section, some formal or informal definitions of the basic concepts will be given. Definitions are taken from (Lenz, 1998) Knowledge Knowledge can be understood as an informal notion describing something that a human, a formal system or a machine can possibly use in order to perform a certain task (to solve a problem). In order to use knowledge some entities need to have an access to it and to know how to apply it in solving problems. The way the knowledge is expressed is the type of knowledge representation, which consists of certain data structures and some additional operators that allow changes on the data structure. The most common data structure in case-based reasoning is the attribute-value representation. Every attribute is given by: a name A a usually finite set DOM(A) called the domain of the attribute A a variable x A For a finite set A i, 1 <= i <= n, of attributes an attribute-value vector is an n-tuple (a 1,...,a n ) such that a i DOM(A i ). However, if one wants to deal with incomplete knowledge (which is occurring frequently in case-based reasoning), he must allow that some variables exist without values (value unknown) Basic Concepts Case-based reasoning is a problem solving technology. The basic scenario for case-based reasoning, from the simplified point of view, looks as follows: In order to find a solution of an actual problem one looks for a similar problem in an experience base, takes the solution from the past and uses it as a starting point to find a solution to the actual problem.

2 A general desire in every knowledge-based system is to make use of the past experience. An experience may be concerned with what was true or false, correct or incorrect, more or less useful. It can be represented by a rule, constraint, some general law or advice or simply by saving a past event. From all of this the main idea of the case can be obtained. The case is some recorded situation where the problem was totally or partially solved. In its simplest form, the case is represented as an ordered pair (problem, solution) The existence of the case means that the corresponding episode happened in the past. This episode contains some decisions that a decision maker found useful. However, somebody else may not be happy with such a case and neglect it. From this follows that cases must be selected carefully, so different categories of cases can exist: good, typical, important, misleading or unnecessary. A case base is a set of cases, which is usually equipped with some additional structure. A structured case base is usually called a case memory. In many practical applications, one deals with problems with incomplete information. Both, the problem and the solution part in the case may be incompletely described. In these situations we talk about incomplete cases. The case completion is another task that can be solved by using case-based reasoning technology. The next very important concept in the case-based reasoning is similarity. While in classical databases information can be retrieved by using only exact matches, in the case-based reasoning cases can be retrieved by using even inexact matches. The notion of similarity is equivalent to a dual mathematical concept - distance. In the functional way similarity can be defined as a function sim : U CB [0, 1] where U refers to the universe of all objects, while CB refers to the case base (just those objects which were examined in the past and saved in the case memory). The higher value of the similarity function means that these objects are more similar. The boundary case is sim(x, x) = 1, which means that each object is the most similar to itself. Retrieval is a basic operation in databases and therefore in the case base too. A query to a database retrieves some information by an exact match by using a key, while a query to a case-based reasoning system presents a problem and returns a solution by using inexact matches with the problems from the cases in the case base. As in databases, trees play a major role in efficient retrieval. Some examples of retrieval structures are: kd-trees (k-dimensional trees), case retrieval nets, discrimination nets etc. The simplest way to use retrieved case is simply to take the unchanged solution of that case as the solution to the actual problem. However, in many applications even small differences between the actual and the case problem may require significant modifications to the solution. Making the appropriate changes to the case solution is called a case adaptation. A general demand is that the solution of a similar problem should be easily adapted to a solution of an actual problem. The knowledge container is the structural element, which contains some quantity of knowledge. The idea of the knowledge container is totally different from the traditional module concept in programming. While the module is responsible for a certain subtask, the knowledge container does not complete the subtask but contains some knowledge relevant to

3 many tasks. Even small tasks require the participation of each container. The concept of the knowledge container is similar to concepts of the nodes and propagation rules in neural networks. In case-based reasoning we identify the following knowledge containers: a) the vocabulary used; b) the similarity measure; c) the case base; and d) the solution transformation. In principle, each container can carry almost all knowledge available. From a software engineering point of view there is another advantage of case-based reasoning - the content of the containers can be changed locally. This means that manipulations on one container have little consequences on the other ones. As a consequence, maintenance operations (Iglezakis 2001), (Reinartz 2000) are easier to be performed then on classical knowledge based systems. The task of machine learning is to improve a certain performance using some experience or instructions. In inductive learning, problems and good solutions are presented to the system. The major desire is to improve a general solution method in every inductive step. Machine learning methods can be used in order to improve the knowledge containers of a case-based reasoning system (the case base, similarity measures and the solution transformation). However, one of the greatest advantages of the case-based reasoning system is that it can learn even through the work with users modifying some knowledge containers. The case based reasoning system has not only to provide solutions to problems but also to take care of other tasks occurring when it is used in practice. The main phases of the casebased reasoning activities are described in the CBR-cycle of (Aamodt and Plaza, 1994) in Figure 1. Figure 1. CBR-cycle of Aamodt and Plaza (1994)

4 In the retrieve phase the most similar case (or k most similar cases), to the problem case, is retrieved, while in the reuse phase some modifications to the retrieved case is done in order to provide better solution to the problem (case adaptation). As the case-based reasoning only suggests solutions, there may be a need for a correctness proof or an external validation. That is the task of the phase revise. In the retain phase the knowledge, learned from this problem, is integrated in the system by modifying some knowledge containers. 2. Extending some Foundations of Case-Based Reasoning The case-based reasoning was developed in the context and in the neighborhood of problem solving methods, learning methods (Machine Learning, Statistics, Neural Networks) and retrieval methods (Data Bases, Information Retrieval). It has inherited the concepts of "problem" and "solution" and a notion of "similarity" based on the distance. The basic concepts of the case-based reasoning can be extended in the following way: we will use acceptance instead of similarity, because acceptance includes similarity but also other approaches related to "expected usefulness", "reminds on" etc. we will use the term case completion instead of solution (including solutions of problems but also a proposal of intermediate problem solving steps). we will consider cases as sets of information entities instead of vectors (whereby this approach includes vectors as well as textual documents) Case completion Case-based reasoning is considered as a problem solving method; given a problem we have to find the solution. This leads to a view where cases are split into the problem and the solution part. Given a new problem we search for related problems in the case memory and adapt their solution for the new problem. However, problem solving usually does not start with a complete problem description, which makes the identification of a final solution more difficult. Nevertheless, the new case is often talked of as a given entity when only the first impression of the underlying task is given. Instead of this, we want to keep attention to the fact that the whole process of completing the task up to the final solution. The consequence is that the resulting case usually depends on a number of decisions. These decisions are initially open; they depend on future human decisions. Depending on different possible decisions, we can end up with different cases. Most practical tasks are performed as processes with a lot of intermediate steps. Each of these steps could be considered as a single new problem-solving step. The question arises, as to whether we need different sets of cases to support each of these steps. This would mean splitting the whole story of the process into different cases for a later usage by the case-based reasoning. Case completion is an attempt to avoid such approach. A case should be a description of the whole performance of the task with all steps, and it should be useful for later tasks at intermediate situations, too. The main consequence of the case completion is that we do not actually need any distinction between the problem and the solution part in the case.

5 2.2. Information Entities Information entities are the atomic constituents of cases and queries. We consider a case as the result of the case completion process. Each step of that process adds some information entities. The current situation during the elaboration of a task is described by the information entities known at the time point. The final case, as it later may appear in the case memory, is a completed set of information entities. The collected information entities result from the real world (an outcome of the test, a decision in an intermediate design step, etc). They are not a direct result of the case-based reasoning process - case-based reasoning is used to propose the next step (some test, the next design decision etc). The number of information entities in a case may be variable. It is up to a human decision at which time point the task is finished. The information entities, which are later used for retrieval, (which appear in the case memory) may be only a subset of the information entities collected during the case completion. These information entities (in the case memory) serve as the indexes for retrieval. The case memory consists of cases, which are sets of such information entities. These cases may then point to related complete descriptions in a collection of "full cases". The information entity is an atomic part of a case or query. E denotes the set of all information entities in a given domain. A case is a set of information entities: c E. The set of cases (in the case memory) is denoted by C, C P(E). A query is a set of information entities: q E. In many applications, the information entities are simply attribute-value pairs. Some examples of information entities are: <price, 1000>, <price, 324>, <color, blue>, <mass, 54 kg>. We say that the first two information entities are comparable (because they have the same attribute) while the other information entities are not comparable. This causes a structuring of the set E into disjoint sets E A, where E A contains all attribute-value pairs from E for a certain attribute A. If cases and queries are considered as attribute-value vectors over a finite set of attributes A 1,,A n, then each case or query may contain at most one information entity from each E Ai Acceptance We want to use the association of information entities for reminding cases with the expectation that these cases are useful for a given query. Usefulness of a case in the case completion process depends on real world circumstances that are not completely known at the retrieval time. This means that usefulness is only an a posteriori criterion. The retrieval from the case memory will be based on matching of certain information entities. Usefulness of former cases is not restricted to those cases that are similar to a given query for all information entities. Cases may contain information entities that have no counterpart in the query. It is also possible that some information entities of the query are not present in the useful case.

6 Some special desirable properties of acceptance are following: P1: A case might be acceptable for a query even if there exist some information entities that are not comparable. P2: A case might be unacceptable for a query if there exist an unacceptable information entity (a fix budget may forbid expensive offers). P3: The same information entity may have different importance for different cases (information entity <sex, male> has different importance in pregnancy testing and in testing for influenza). P4: The same information entity may have different importance for different queries according to the user's intentions (material have different priorities in design queries). P5: Information entities may not be independent of each other. In order to provide better understanding of acceptance we will define the preference relation ( q ), over the set of all potential cases, in the following way: c' q c'' if case c' is preferable to case c'' in regard to the query q. The definitions of acceptance functions will be given for cases and queries represented as feature vectors (and not as a set of information entities) because it is a more convenient form of representation. Both the queries and the cases are considered as feature vectors (a 1,,a n ), where a i specifies the value for the i-th attribute A i. Formally, there is no difference between case vectors c = (c 1,,c n ) and query vectors q = (q 1,,q n ). Definition 1. (Global Acceptance Function): Let U := dom(a 1 ) dom(a n ) denote the set of all queries and cases. The acceptance of a case for a query is expressed by a global acceptance function acc : U U R ( 1 ) such that a higher value acc(q,c) denotes a higher acceptance of the case c for the query q. The preference relation q U U induced by a query q U is defined by c' q c'' iff acc(q,c') acc(q,c''). ( 2 ) Definition 2. (Local Acceptance Functions for Attributes): A local acceptance function i for the attribute A i is defined over the domain dom(a i ): i : dom(a i ) dom(a i ) R ( 3 ) such that higher value i (q i,c i ) denotes a higher acceptance of the value c i (of a case c) for the value q i (of a query q). Global acceptance function can be obtained from local acceptance functions by a related composition function as follows: Definition 3. (Composite Acceptance Function): A global acceptance function acc is called composite if it is composed by a composite function : R R R from related local acceptance functions i : acc((q 1,,q n),(c 1,,c n )) = ( 1 (q 1,c 1 ),, n (q n,c n )). ( 4 ) The natural demand is that composition functions must be monotonously increasing. An example for the composition of local acceptance values is given by a weighted sum with only positive weights g i (because of monotonously increasing composition function): acc((q 1,,q n ),(c 1,,c n )) = g i i (q i,c i ) ( 5 )

7 Addition is widely used for the combination of local values. It has an intuitive interpretation concerning acceptance in the sense of "collecting arguments" in favor of something. Positive arguments have positive values, while negative arguments are expressed by negative values. The value 0 does not change the result, so unimportant or unknown attributes can be treated with value 0. Therefore, properties P1 and P2 are satisfied. However, a more general combination is necessary to satisfy properties P3, P4 and P5. For illustration, we consider two simple local acceptance functions over the real numbers, which are composed by addition (weighted sum whose weights are all equal to 1). In Figure 2. we consider the local acceptance function i (q i,c i ) = 1 / (1+ q i - c i ), while in Figure 3. we consider the function i (q i,c i ) = 1- q i - c i. f(x) = 1/(1+ x ) 1/(1+ q 1 -c 1 ) + 1/(1+ q 2 -c 2 ) = a Figure 2. The local acceptance function i (q i,c i ) = 1 / (1+ q i - c i ) f(x) = 1 - x (1- q 1 -c 1 ) + (1- q 2 -c 2 ) = a Figure 3. The local acceptance function i (q i,c i ) = 1- q i - c i. The left sides of these pictures present the graphic of the function f(x) = i (0,x), which shows the values of the local acceptance function for the fixed query (q = 0). The right parts of these pictures show some characteristics of the resulting global acceptance functions in the twodimensional universe. All points c = (c 1,c 2 ) on a characteristic have the same acceptance a for a fixed query q = (q 1,q 2 ). In Figure 2, we have closed characteristics for large values a, but the characteristics are opened for lower values a (these curves actually never meet each other). The reason is that a

8 high local acceptance value of a single attribute is sufficient to reach desired global acceptance value independently of other attributes (the local acceptance values are always positive, so the global acceptance is never reduced). The situation changes if unlimited negative local acceptance values are allowed as in the Figure 3. On this picture all curves are closed. This situation is applied when we have to accumulate even "rejection" and not just "acceptance" The general case In this section we will generalize the previous concepts in order to satisfy the properties P1,,P5. Queries have been defined as sets of information entities. A weighted query is the generalization of this concept. Definition 4. (Weighted query): The weighted query assigns an importance value to each information entity by a function: q : E R, ( 6 ) where q (e) denotes the importance of the information entity e for the query q. High values indicate a high importance; negative values indicate the rejection of related cases. The value 0 is used as a neutral element ( q (e) = 0, means that information entity e is unimportant to the query q). Of course, values for q (e) can be taken from the set {0,1}, meaning that "e is (un)important for the q". By using we can compute the acceptance of the information entity e' from the case for a single information entity e of a query. However, a query may contain several information entities e such that (e,e') is defined for the single information entity e'. The question is: how these values can be combined to a single value for e' which express the resulting acceptance value of e' for that query. Definition 5. (Local Accumulation Function): Let E e = {e 1,,e n } denote the set of all information entities to which the information entity e is comparable concerning acceptance (E e = {e' (e',e) is defined}). The local accumulation function e for e is a function: e : R R R ( 7 ) n times such that e (a 1,,a n ) denotes the accumulated acceptance in e. The values a i denote the contributions of the information entities e i E e according to their occurrence in the query q and their local acceptance computed by (e i,e). The contributions are computed by a function: f : R R R ( 8 ) such that a i = f( q (e i ), (e i,e)). We consider the retrieval of the cases as a process of reminding. Reminding may be of different strength; cases are in competition for retrieval according to the query. The cases receiving more reminders of more strength are the winners. The strength (importance, relevance) of reminding for an information entity e c is given by a relevance function:

9 Definition 6. (Relevance Function): The relevance between information entities and cases is described by a relevance function: : E C R. ( 9 ) The relevance (e,c) is considered as a measure for the relevance of information entity e for the retrieval of a case c. (e,c) is defined if and only if e c. Negative values (e,c) may be used in the meaning "do not retrieve the case c if one asks for the information entity e". The acceptance of a case c for the query q is accumulated from the contributions of the information entities e c according to their relevancies (e,c). The contributions p e of the information entities are computed by their accumulation functions e as described in the definition 5. The accumulation in the cases is evaluated by Global accumulation function. Definition 7. (Global Accumulation Function): The global accumulation function c has the form: c : R R R, ( 10 ) k times for c = {e 1,,e k }. The accumulated acceptance of the case c regarding its constituting information entities is then computed by c (p 1,,p k ), where p i is the contribution of the information entity e i c. This contribution p i depends on (e i,c) and another real value x i assigned to e i (x i is the accumulated local acceptance value computed by ei (a 1,,a n ) from definition 5.). The contributions p i are computed by a function: g : R R R, ( 11 ) such that p i = g(x i, (e i,c)). The global acceptance function, which satisfies properties P1,,P5, is calculated in the following way: Definition 8. (Extended Acceptance Function): Acceptance between weighted queries and cases is expressed by an extended acceptance function: acc : R E P(E) R. ( 12 ) The acceptance acc( q,c) of a case c for a weighted query q can now be accumulated by using the introduced functions: acc( q,c) = c (g ( e'1 (f ( q (e 1,1 ), (e 1,1,e' 1 )),,f ( q (e 1,n1 ), (e 1,n1,e' 1 )), (e 1 ',c)),... g ( e'k (f ( q (e k,1 ), (e k,1,e' k )),,f ( q (e k,nk ), (e k,nk,e' k )), (e k ',c)) ) where c={e' 1,,e' k } and E e'i = {e i,1, e i,ni } for i = 1,,k. ( 13 ) If, for example, we consider f and g as products and c and e as sums then we get: e' c acc(, c) ( e', c) ( e, e' ) ( e) q e E e' q ( 14 )

10 Here, the properties P1,,P4 are satisfied, but for satisfaction of the property P5, the appropriate selection of the functions f, g, c and e is needed. 3. Conclusion Case-based reasoning is a relatively new and promising area of artificial intelligence. Casebased reasoning is a reasoning method that facilitates knowledge management in which knowledge is a case base acquired by a learning process. Case-based reasoning can be used for solving problems in many practical domains such as: mechanical engineering, medicine, business administration etc. Furthermore, for each domain, various task types can be implemented. Some of them are: classification, diagnosis, configuration, planning, decision support etc. 4. References 1. Aamodt, A., Plaza, E., (1994), Case-Based Reasoning: Foundational Issues, Methodological Variations and System Approaches, AI Commutations, pp Iglezakis, I. (2001), The Conflict Graph for Maintaining Case-Based Reasoning Systems, 4 th International Conference on Case-Based Reasoning (ICCBR 2001), pp , Vancouver, Canada, July/August Lenz, M., Brtsch-Sporl, B., Burkhard, H., Wess, S. (1998), Case-Based Reasoning Technology: From Foundation to Applications, Springer, Reinartz, T., Iglezakis, I., Roth-Bergofer, T., (2000), On Quality Measures for Case Base Maintenance, 5 th European Workshop (EWCBR 2000), pp , Trento, Italy, September 2000.

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

A KNOWLEDGE-BASED APPROACH TO RAPID AND RELIABLE TOOL DESIGN

A KNOWLEDGE-BASED APPROACH TO RAPID AND RELIABLE TOOL DESIGN A KNOWLEDGE-BASED APPROACH TO RAPID AND RELIABLE TOOL DESIGN Dieter H. MÜLLER * and Axel SELK * * Bremen Institute of Industrial Technology and Applied Work Science at the University of Bremen, Bremen,

More information

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong.

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong. Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR, China fyclaw,jleeg@cse.cuhk.edu.hk

More information

A Model of Machine Learning Based on User Preference of Attributes

A Model of Machine Learning Based on User Preference of Attributes 1 A Model of Machine Learning Based on User Preference of Attributes Yiyu Yao 1, Yan Zhao 1, Jue Wang 2 and Suqing Han 2 1 Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada

More information

Data-Flow Analysis Foundations

Data-Flow Analysis Foundations CS 301 Spring 2016 Meetings April 11 Data-Flow Foundations Plan Source Program Lexical Syntax Semantic Intermediate Code Generation Machine- Independent Optimization Code Generation Target Program This

More information

Graphical Models. Pradeep Ravikumar Department of Computer Science The University of Texas at Austin

Graphical Models. Pradeep Ravikumar Department of Computer Science The University of Texas at Austin Graphical Models Pradeep Ravikumar Department of Computer Science The University of Texas at Austin Useful References Graphical models, exponential families, and variational inference. M. J. Wainwright

More information

Introduction to Software Testing Chapter 3, Sec# 1 & 2 Logic Coverage

Introduction to Software Testing Chapter 3, Sec# 1 & 2 Logic Coverage Introduction to Software Testing Chapter 3, Sec# 1 & 2 Logic Coverage Paul Ammann & Jeff Offutt http://www.cs.gmu.edu/~offutt/soft waretest/ Ch. 3 : Logic Coverage Four Structures for Modeling Software

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

Chapter 3. Uncertainty and Vagueness. (c) 2008 Prof. Dr. Michael M. Richter, Universität Kaiserslautern

Chapter 3. Uncertainty and Vagueness. (c) 2008 Prof. Dr. Michael M. Richter, Universität Kaiserslautern Chapter 3 Uncertainty and Vagueness Motivation In most images the objects are not precisely defined, e.g. Landscapes, Medical images etc. There are different aspects of uncertainty involved that need to

More information

INCONSISTENT DATABASES

INCONSISTENT DATABASES INCONSISTENT DATABASES Leopoldo Bertossi Carleton University, http://www.scs.carleton.ca/ bertossi SYNONYMS None DEFINITION An inconsistent database is a database instance that does not satisfy those integrity

More information

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic 3.4 Deduction and Evaluation: Tools 3.4.1 Conditional-Equational Logic The general definition of a formal specification from above was based on the existence of a precisely defined semantics for the syntax

More information

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Leopoldo Bertossi Carleton University Ottawa, Canada bertossi@scs.carleton.ca Solmaz Kolahi University of British Columbia

More information

Towards a Logical Reconstruction of Relational Database Theory

Towards a Logical Reconstruction of Relational Database Theory Towards a Logical Reconstruction of Relational Database Theory On Conceptual Modelling, Lecture Notes in Computer Science. 1984 Raymond Reiter Summary by C. Rey November 27, 2008-1 / 63 Foreword DB: 2

More information

Conflict-based Statistics

Conflict-based Statistics Conflict-based Statistics Tomáš Müller 1, Roman Barták 1 and Hana Rudová 2 1 Faculty of Mathematics and Physics, Charles University Malostranské nám. 2/25, Prague, Czech Republic {muller bartak}@ktiml.mff.cuni.cz

More information

Lecture 1 Contracts : Principles of Imperative Computation (Fall 2018) Frank Pfenning

Lecture 1 Contracts : Principles of Imperative Computation (Fall 2018) Frank Pfenning Lecture 1 Contracts 15-122: Principles of Imperative Computation (Fall 2018) Frank Pfenning In these notes we review contracts, which we use to collectively denote function contracts, loop invariants,

More information

A Theory of Redo Recovery

A Theory of Redo Recovery A Theory of Redo Recovery David Lomet Microsoft Research Redmond, WA 98052 lomet@microsoft.com Mark Tuttle HP Labs Cambridge Cambridge, MA 02142 mark.tuttle@hp.com ABSTRACT Our goal is to understand redo

More information

Mining High Order Decision Rules

Mining High Order Decision Rules Mining High Order Decision Rules Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 e-mail: yyao@cs.uregina.ca Abstract. We introduce the notion of high

More information

Costas Tsatsoulis and Julian Holtzman. Lawrence Applied Research Corporation (LARC) Lawrence, KS

Costas Tsatsoulis and Julian Holtzman. Lawrence Applied Research Corporation (LARC) Lawrence, KS From: Proceedings of the Twelfth International FLAIRS Conference. Copyright 1999, AAAI (www.aaai.org). All rights reserved. Generating Satellite Control Schedules Using Case-Based Scheduling Costas Tsatsoulis

More information

Mathematically Rigorous Software Design Review of mathematical prerequisites

Mathematically Rigorous Software Design Review of mathematical prerequisites Mathematically Rigorous Software Design 2002 September 27 Part 1: Boolean algebra 1. Define the Boolean functions and, or, not, implication ( ), equivalence ( ) and equals (=) by truth tables. 2. In an

More information

Structural and Syntactic Pattern Recognition

Structural and Syntactic Pattern Recognition Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent

More information

Chapter 6. The Interpretation Process. (c) 2008 Prof. Dr. Michael M. Richter, Universität Kaiserslautern

Chapter 6. The Interpretation Process. (c) 2008 Prof. Dr. Michael M. Richter, Universität Kaiserslautern Chapter 6 The Interpretation Process The Semantic Function Syntactically an image is simply a matrix of pixels with gray or color values. The intention is that the image mirrors the visual impression of

More information

A computer implemented philosophy of mathematics

A computer implemented philosophy of mathematics A computer implemented philosophy of mathematics M. Randall Holmes May 14, 2018 This paper presents a philosophical view of the basic foundations of mathematics, which is implemented in actual computer

More information

On The Formal Specification of Database Schema Constraints

On The Formal Specification of Database Schema Constraints On The Formal Specification of Database Schema Constraints Ivan Luković University of Novi Sad, Faculty of Technical Sciences Novi Sad, Serbia and Montenegro ivan@uns.ns.ac.yu Sonja Ristić Higher Business

More information

Seismic regionalization based on an artificial neural network

Seismic regionalization based on an artificial neural network Seismic regionalization based on an artificial neural network *Jaime García-Pérez 1) and René Riaño 2) 1), 2) Instituto de Ingeniería, UNAM, CU, Coyoacán, México D.F., 014510, Mexico 1) jgap@pumas.ii.unam.mx

More information

STABILITY AND PARADOX IN ALGORITHMIC LOGIC

STABILITY AND PARADOX IN ALGORITHMIC LOGIC STABILITY AND PARADOX IN ALGORITHMIC LOGIC WAYNE AITKEN, JEFFREY A. BARRETT Abstract. Algorithmic logic is the logic of basic statements concerning algorithms and the algorithmic rules of deduction between

More information

Course on Database Design Carlo Batini University of Milano Bicocca Part 5 Logical Design

Course on Database Design Carlo Batini University of Milano Bicocca Part 5 Logical Design Course on Database Design Carlo atini University of Milano icocca Part 5 Logical Design 1 Carlo atini, 2015 This work is licensed under the Creative Commons Attribution NonCommercial NoDerivatives 4.0

More information

Discrete Mathematics Lecture 4. Harper Langston New York University

Discrete Mathematics Lecture 4. Harper Langston New York University Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a

More information

A Catalog of While Loop Specification Patterns

A Catalog of While Loop Specification Patterns A Catalog of While Loop Specification Patterns Aditi Barua and Yoonsik Cheon TR #14-65 September 2014 Keywords: functional program verification, intended functions, program specification, specification

More information

EVALUATING A SOFTWARE COSTING METHOD BASED ON SOFTWARE FEATURES AND CASE BASED REASONING

EVALUATING A SOFTWARE COSTING METHOD BASED ON SOFTWARE FEATURES AND CASE BASED REASONING EVALUATING A SOFTWARE COSTING METHOD BASED ON SOFTWARE FEATURES AND CASE BASED REASONING Christopher Irgens, University of Strathclyde, Department of Design, Manufacture and Engineering Management, 75

More information

Lecture 5. Logic I. Statement Logic

Lecture 5. Logic I. Statement Logic Ling 726: Mathematical Linguistics, Logic. Statement Logic V. Borschev and B. Partee, September 27, 2 p. Lecture 5. Logic I. Statement Logic. Statement Logic...... Goals..... Syntax of Statement Logic....2.

More information

Uncertain Data Models

Uncertain Data Models Uncertain Data Models Christoph Koch EPFL Dan Olteanu University of Oxford SYNOMYMS data models for incomplete information, probabilistic data models, representation systems DEFINITION An uncertain data

More information

Lecture 2 Finite Automata

Lecture 2 Finite Automata Lecture 2 Finite Automata August 31, 2007 This lecture is intended as a kind of road map to Chapter 1 of the text just the informal examples that I ll present to motivate the ideas. 1 Expressions without

More information

Representing Product Designs Using a Description Graph Extension to OWL 2

Representing Product Designs Using a Description Graph Extension to OWL 2 Representing Product Designs Using a Description Graph Extension to OWL 2 Henson Graves Lockheed Martin Aeronautics Company Fort Worth Texas, USA henson.graves@lmco.com Abstract. Product development requires

More information

RESULTS ON TRANSLATING DEFAULTS TO CIRCUMSCRIPTION. Tomasz Imielinski. Computer Science Department Rutgers University New Brunswick, N.

RESULTS ON TRANSLATING DEFAULTS TO CIRCUMSCRIPTION. Tomasz Imielinski. Computer Science Department Rutgers University New Brunswick, N. RESULTS ON TRANSLATING DEFAULTS TO CIRCUMSCRIPTION Tomasz Imielinski Computer Science Department Rutgers University New Brunswick, N.J 08905 ABSTRACT In this paper we define different concepts, of translating

More information

Perspectives on the Integration of Fuzzy and Case-Based Reasoning Systems. Michael M. Richter

Perspectives on the Integration of Fuzzy and Case-Based Reasoning Systems. Michael M. Richter Perspectives on the Integration of Fuzzy and Case-Based Reasoning Systems Michael M. Richter Perspectives on the Integration of Fuzzy and Case-Based Reasoning Systems Michael M. Richter University of Kaiserslautern

More information

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013!

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013! Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are

More information

A FRAMEWORK FOR KNOWLEDGE-BASED CONFIGURATION OF PROJECT MANAGEMENT INFORMATION SYSTEMS

A FRAMEWORK FOR KNOWLEDGE-BASED CONFIGURATION OF PROJECT MANAGEMENT INFORMATION SYSTEMS A FRAMEWORK FOR KNOWLEDGE-BASED CONFIGURATION OF PROJECT MANAGEMENT INFORMATION SYSTEMS Solvita Berzisa, Janis Grabis Riga Technical University, Faculty of Computer Science and Information Technology,

More information

Dynamic Scheduling Based on Simulation of Workflow

Dynamic Scheduling Based on Simulation of Workflow Dynamic Scheduling Based on Simulation of Workflow Ji Haifeng, Fan Yushun Department of Automation, Tsinghua University, P.R.China (100084) Extended Abstract: Scheduling is classified into two sorts by

More information

Distributed Case-based Reasoning for Fault Management

Distributed Case-based Reasoning for Fault Management Distributed Case-based Reasoning for Fault Management Ha Manh Tran and Jürgen Schönwälder Computer Science, Jacobs University Bremen, Germany 1st EMANICS Workshop on Peer-to-Peer Management University

More information

Foundations of Preferences in Database Systems

Foundations of Preferences in Database Systems Foundations of Preferences in Database Systems Werner Kießling Institute of Computer Science University of Augsburg W. Kießling, 28th Intern. Conf. on Very Large Databases (VLDB 2002), Hong Kong, 21.08.02

More information

Surfaces Beyond Classification

Surfaces Beyond Classification Chapter XII Surfaces Beyond Classification In most of the textbooks which present topological classification of compact surfaces the classification is the top result. However the topology of 2- manifolds

More information

Chapter S:II. II. Search Space Representation

Chapter S:II. II. Search Space Representation Chapter S:II II. Search Space Representation Systematic Search Encoding of Problems State-Space Representation Problem-Reduction Representation Choosing a Representation S:II-1 Search Space Representation

More information

Lecture 1 Contracts. 1 A Mysterious Program : Principles of Imperative Computation (Spring 2018) Frank Pfenning

Lecture 1 Contracts. 1 A Mysterious Program : Principles of Imperative Computation (Spring 2018) Frank Pfenning Lecture 1 Contracts 15-122: Principles of Imperative Computation (Spring 2018) Frank Pfenning In these notes we review contracts, which we use to collectively denote function contracts, loop invariants,

More information

Two Comments on the Principle of Revealed Preference

Two Comments on the Principle of Revealed Preference Two Comments on the Principle of Revealed Preference Ariel Rubinstein School of Economics, Tel Aviv University and Department of Economics, New York University and Yuval Salant Graduate School of Business,

More information

THE preceding chapters were all devoted to the analysis of images and signals which

THE preceding chapters were all devoted to the analysis of images and signals which Chapter 5 Segmentation of Color, Texture, and Orientation Images THE preceding chapters were all devoted to the analysis of images and signals which take values in IR. It is often necessary, however, to

More information

A Content Based Image Retrieval System Based on Color Features

A Content Based Image Retrieval System Based on Color Features A Content Based Image Retrieval System Based on Features Irena Valova, University of Rousse Angel Kanchev, Department of Computer Systems and Technologies, Rousse, Bulgaria, Irena@ecs.ru.acad.bg Boris

More information

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3. Set Theory. 3.1 What is a Set? Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

More information

Rough Sets, Neighborhood Systems, and Granular Computing

Rough Sets, Neighborhood Systems, and Granular Computing Rough Sets, Neighborhood Systems, and Granular Computing Y.Y. Yao Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca Abstract Granulation

More information

This is already grossly inconvenient in present formalisms. Why do we want to make this convenient? GENERAL GOALS

This is already grossly inconvenient in present formalisms. Why do we want to make this convenient? GENERAL GOALS 1 THE FORMALIZATION OF MATHEMATICS by Harvey M. Friedman Ohio State University Department of Mathematics friedman@math.ohio-state.edu www.math.ohio-state.edu/~friedman/ May 21, 1997 Can mathematics be

More information

LP-Modelling. dr.ir. C.A.J. Hurkens Technische Universiteit Eindhoven. January 30, 2008

LP-Modelling. dr.ir. C.A.J. Hurkens Technische Universiteit Eindhoven. January 30, 2008 LP-Modelling dr.ir. C.A.J. Hurkens Technische Universiteit Eindhoven January 30, 2008 1 Linear and Integer Programming After a brief check with the backgrounds of the participants it seems that the following

More information

CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING

CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING in partnership with Overall handbook to set up a S-DWH CoE: Deliverable: 4.6 Version: 3.1 Date: 3 November 2017 CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING Handbook to set up a S-DWH 1 version 2.1 / 4

More information

Handout 9: Imperative Programs and State

Handout 9: Imperative Programs and State 06-02552 Princ. of Progr. Languages (and Extended ) The University of Birmingham Spring Semester 2016-17 School of Computer Science c Uday Reddy2016-17 Handout 9: Imperative Programs and State Imperative

More information

At the end of the chapter, you will learn to: Present data in textual form. Construct different types of table and graphs

At the end of the chapter, you will learn to: Present data in textual form. Construct different types of table and graphs DATA PRESENTATION At the end of the chapter, you will learn to: Present data in textual form Construct different types of table and graphs Identify the characteristics of a good table and graph Identify

More information

Liveness and Fairness Properties in Multi-Agent Systems

Liveness and Fairness Properties in Multi-Agent Systems Liveness and Fairness Properties in Multi-Agent Systems Hans-Dieter Burkhard FB Informatik Humboldt-University Berlin PF 1297, 1086 Berlin, Germany e-mail: hdb@informatik.hu-berlin.de Abstract Problems

More information

A METHOD TO MODELIZE THE OVERALL STIFFNESS OF A BUILDING IN A STICK MODEL FITTED TO A 3D MODEL

A METHOD TO MODELIZE THE OVERALL STIFFNESS OF A BUILDING IN A STICK MODEL FITTED TO A 3D MODEL A METHOD TO MODELIE THE OVERALL STIFFNESS OF A BUILDING IN A STICK MODEL FITTED TO A 3D MODEL Marc LEBELLE 1 SUMMARY The aseismic design of a building using the spectral analysis of a stick model presents

More information

DISCRETE DOMAIN REPRESENTATION FOR SHAPE CONCEPTUALIZATION

DISCRETE DOMAIN REPRESENTATION FOR SHAPE CONCEPTUALIZATION DISCRETE DOMAIN REPRESENTATION FOR SHAPE CONCEPTUALIZATION Zoltán Rusák, Imre Horváth, György Kuczogi, Joris S.M. Vergeest, Johan Jansson Department of Design Engineering Delft University of Technology

More information

Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming

Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming Raphael Arias Technische Universität München 19.1.2015 Abstract

More information

Programming Languages Third Edition

Programming Languages Third Edition Programming Languages Third Edition Chapter 12 Formal Semantics Objectives Become familiar with a sample small language for the purpose of semantic specification Understand operational semantics Understand

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

Concurrent Objects and Linearizability

Concurrent Objects and Linearizability Chapter 3 Concurrent Objects and Linearizability 3.1 Specifying Objects An object in languages such as Java and C++ is a container for data. Each object provides a set of methods that are the only way

More information

"Relations for Relationships"

Relations for Relationships M359 An explanation from Hugh Darwen "Relations for Relationships" This note might help those who have struggled with M359's so-called "relation for relationship" method of representing, in a relational

More information

A Vertex Chain Code Approach for Image Recognition

A Vertex Chain Code Approach for Image Recognition A Vertex Chain Code Approach for Image Recognition Abdel-Badeeh M. Salem, Adel A. Sewisy, Usama A. Elyan Faculty of Computer and Information Sciences, Assiut University, Assiut, Egypt, usama471@yahoo.com,

More information

Topic: Orientation, Surfaces, and Euler characteristic

Topic: Orientation, Surfaces, and Euler characteristic Topic: Orientation, Surfaces, and Euler characteristic The material in these notes is motivated by Chapter 2 of Cromwell. A source I used for smooth manifolds is do Carmo s Riemannian Geometry. Ideas of

More information

An Evolution of Mathematical Tools

An Evolution of Mathematical Tools An Evolution of Mathematical Tools From Conceptualization to Formalization Here's what we do when we build a formal model (or do a computation): 0. Identify a collection of objects/events in the real world.

More information

February 24, :52 World Scientific Book - 9in x 6in soltys alg. Chapter 3. Greedy Algorithms

February 24, :52 World Scientific Book - 9in x 6in soltys alg. Chapter 3. Greedy Algorithms Chapter 3 Greedy Algorithms Greedy algorithms are algorithms prone to instant gratification. Without looking too far ahead, at each step they make a locally optimum choice, with the hope that it will lead

More information

Number System. Introduction. Natural Numbers (N) Whole Numbers (W) Integers (Z) Prime Numbers (P) Face Value. Place Value

Number System. Introduction. Natural Numbers (N) Whole Numbers (W) Integers (Z) Prime Numbers (P) Face Value. Place Value 1 Number System Introduction In this chapter, we will study about the number system and number line. We will also learn about the four fundamental operations on whole numbers and their properties. Natural

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2002 Vol. 1, No. 2, July-August 2002 The Theory of Classification Part 2: The Scratch-Built

More information

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VI (Nov Dec. 2014), PP 29-33 Analysis of Image and Video Using Color, Texture and Shape Features

More information

Denotational Semantics. Domain Theory

Denotational Semantics. Domain Theory Denotational Semantics and Domain Theory 1 / 51 Outline Denotational Semantics Basic Domain Theory Introduction and history Primitive and lifted domains Sum and product domains Function domains Meaning

More information

Assessing Information Quality for the Composite Relational Operation Join

Assessing Information Quality for the Composite Relational Operation Join Proceedings of the eventh International Conference on Information Quality (ICIQ-02) Assessing Information Quality for the Composite elational Operation Join Amir Parssian umit arkar and Varghese Jacob

More information

Variables and Data Representation

Variables and Data Representation You will recall that a computer program is a set of instructions that tell a computer how to transform a given set of input into a specific output. Any program, procedural, event driven or object oriented

More information

Abstract algorithms. Claus Diem. September 17, 2014

Abstract algorithms. Claus Diem. September 17, 2014 Abstract algorithms Claus Diem September 17, 2014 Abstract We give a framework to argue formally about algorithms with arbitrary data types. The framework is based on category theory, and types are based

More information

Knowledge Representation

Knowledge Representation Knowledge Representation References Rich and Knight, Artificial Intelligence, 2nd ed. McGraw-Hill, 1991 Russell and Norvig, Artificial Intelligence: A modern approach, 2nd ed. Prentice Hall, 2003 Outline

More information

Programs with infinite loops: from primitive recursive predicates to the arithmetic hierarchy

Programs with infinite loops: from primitive recursive predicates to the arithmetic hierarchy Programs with infinite loops: from primitive recursive predicates to the arithmetic hierarchy ((quite) preliminary) Armando B. Matos September 11, 2014 Abstract Infinite time Turing machines have been

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Semantics via Syntax. f (4) = if define f (x) =2 x + 55.

Semantics via Syntax. f (4) = if define f (x) =2 x + 55. 1 Semantics via Syntax The specification of a programming language starts with its syntax. As every programmer knows, the syntax of a language comes in the shape of a variant of a BNF (Backus-Naur Form)

More information

Chapter 3: Propositional Languages

Chapter 3: Propositional Languages Chapter 3: Propositional Languages We define here a general notion of a propositional language. We show how to obtain, as specific cases, various languages for propositional classical logic and some non-classical

More information

Value Added Association Rules

Value Added Association Rules Value Added Association Rules T.Y. Lin San Jose State University drlin@sjsu.edu Glossary Association Rule Mining A Association Rule Mining is an exploratory learning task to discover some hidden, dependency

More information

Introduction. Easy to get started, based on description of the inputs

Introduction. Easy to get started, based on description of the inputs Introduction Testing is about choosing elements from input domain. The input domain of a program consists of all possible inputs that could be taken by the program. Easy to get started, based on description

More information

Instructor: Stefan Savev

Instructor: Stefan Savev LECTURE 2 What is indexing? Indexing is the process of extracting features (such as word counts) from the documents (in other words: preprocessing the documents). The process ends with putting the information

More information

A macro- generator for ALGOL

A macro- generator for ALGOL A macro- generator for ALGOL byh.leroy Compagnie Bull-General Electric Paris, France INTRODUCfION The concept of macro-facility is ambiguous, when applied to higher level languages. For some authorsl,2,

More information

Semantic Event Model and Its Implication on Situation Detection

Semantic Event Model and Its Implication on Situation Detection Association for Information Systems AIS Electronic Library (AISeL) ECIS 2000 Proceedings European Conference on Information Systems (ECIS) 2000 Semantic Event Model and Its Implication on Situation Detection

More information

Learning Rules. How to use rules? Known methods to learn rules: Comments: 2.1 Learning association rules: General idea

Learning Rules. How to use rules? Known methods to learn rules: Comments: 2.1 Learning association rules: General idea 2. Learning Rules Rule: cond è concl where } cond is a conjunction of predicates (that themselves can be either simple or complex) and } concl is an action (or action sequence) like adding particular knowledge

More information

PROCESS SPECIFICATION

PROCESS SPECIFICATION MODULE 6 PROCESS SPECIFICATIO OBJECTIVE QUESTIOS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Revisiting the bijection between planar maps and well labeled trees

Revisiting the bijection between planar maps and well labeled trees Revisiting the bijection between planar maps and well labeled trees Daniel Cosmin Porumbel September 1, 2014 Abstract The bijection between planar graphs and well labeled trees was published by Cori and

More information

EULER S FORMULA AND THE FIVE COLOR THEOREM

EULER S FORMULA AND THE FIVE COLOR THEOREM EULER S FORMULA AND THE FIVE COLOR THEOREM MIN JAE SONG Abstract. In this paper, we will define the necessary concepts to formulate map coloring problems. Then, we will prove Euler s formula and apply

More information

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics 400 lecture note #4 [Ch 6] Set Theory 1. Basic Concepts and Definitions 1) Basics Element: ; A is a set consisting of elements x which is in a/another set S such that P(x) is true. Empty set: notated {

More information

Relational Databases

Relational Databases Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 49 Plan of the course 1 Relational databases 2 Relational database design 3 Conceptual database design 4

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions.

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions. THREE LECTURES ON BASIC TOPOLOGY PHILIP FOTH 1. Basic notions. Let X be a set. To make a topological space out of X, one must specify a collection T of subsets of X, which are said to be open subsets of

More information

Chapter 8. Database Design. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel

Chapter 8. Database Design. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel Chapter 8 Database Design Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel 1 In this chapter, you will learn: That successful database design must reflect the information

More information

Analytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset.

Analytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset. Glossary of data mining terms: Accuracy Accuracy is an important factor in assessing the success of data mining. When applied to data, accuracy refers to the rate of correct values in the data. When applied

More information

Don t just read it; fight it! Ask your own questions, look for your own examples, discover your own proofs. Is the hypothesis necessary?

Don t just read it; fight it! Ask your own questions, look for your own examples, discover your own proofs. Is the hypothesis necessary? Don t just read it; fight it! Ask your own questions, look for your own examples, discover your own proofs. Is the hypothesis necessary? Is the converse true? What happens in the classical special case?

More information

SOME TYPES AND USES OF DATA MODELS

SOME TYPES AND USES OF DATA MODELS 3 SOME TYPES AND USES OF DATA MODELS CHAPTER OUTLINE 3.1 Different Types of Data Models 23 3.1.1 Physical Data Model 24 3.1.2 Logical Data Model 24 3.1.3 Conceptual Data Model 25 3.1.4 Canonical Data Model

More information

CS152: Programming Languages. Lecture 11 STLC Extensions and Related Topics. Dan Grossman Spring 2011

CS152: Programming Languages. Lecture 11 STLC Extensions and Related Topics. Dan Grossman Spring 2011 CS152: Programming Languages Lecture 11 STLC Extensions and Related Topics Dan Grossman Spring 2011 Review e ::= λx. e x e e c v ::= λx. e c τ ::= int τ τ Γ ::= Γ, x : τ (λx. e) v e[v/x] e 1 e 1 e 1 e

More information

Supervised Learning with Neural Networks. We now look at how an agent might learn to solve a general problem by seeing examples.

Supervised Learning with Neural Networks. We now look at how an agent might learn to solve a general problem by seeing examples. Supervised Learning with Neural Networks We now look at how an agent might learn to solve a general problem by seeing examples. Aims: to present an outline of supervised learning as part of AI; to introduce

More information

Artificial Neural Networks Lecture Notes Part 5. Stephen Lucci, PhD. Part 5

Artificial Neural Networks Lecture Notes Part 5. Stephen Lucci, PhD. Part 5 Artificial Neural Networks Lecture Notes Part 5 About this file: If you have trouble reading the contents of this file, or in case of transcription errors, email gi0062@bcmail.brooklyn.cuny.edu Acknowledgments:

More information